Loading... Please wait...


Account Navigation

  • Wish Lists
  • My Account
  • Order Status



Manage the health and deployment of each Toughbook, Toughpad, and other mobile devices within a single console. These licenses are not machine specific.

This is pricing for basic Computrace Services

      Description    Enterprise/Retail           State/Local Govt/Education     Federal Goverment              
Complete 3 Year CF-SVCASCTC3Y $129 ST-SECCTCEDGV3YR $111 ST-SECCTCGOV3Y $103  
Complete 4 Year CF-SVCASCTC4Y $159 ST-SECCTCEDGV4YR $137 ST-SECCTCGOV4Y $127  
Complete 5 Year CF-SVCASCTC5Y $189 ST-SECCTCEDGV5YR $163 ST-SECCTCGOV5Y $151  


Absolute Computrace allows you to persistently secure all of your endpoints, and the sensitive data they contain, to  ensure—and most importantly prove—that endpoint IT compliance processes are properly implemented and enforced.



Absolute Computrace Datasheet

Absolute Computrace datasheet

Read our Absolute Computrace datasheet to learn how organizations stay connected with each device in their deployment.

Absolute Computrace Feature Matrix

Absolute Computrace Feature Matrix

This is a detailed feature overview of Computrace products that provide endpoint security for desktop and laptop computers.




Risk Assessment


Monitor device activity and status, and receive alerts if predefined conditions occur. Examples include non-compliant device location, the status of complementary security technologies such as encryption and anti-malware, offline device control, blacklisted applications, rogue employees, etc.



Lifecycle Security

Apply a layer of security across the entire lifecycle of each device and receive alerts if predefined conditions occur. Examples include securing new devices in transit, validating end users, hardware / software inventories, blacklisted applications, certified end of life data delete protocols, etc.


Risk Response

Remotely invoke security commands and other measures to avoid a significant security incident. Examples include end user messaging, locking a device until its status is confirmed, definitive proof that endpoint data and corporate networks were not accessed while a device was at risk, remote retrieval and deletion of endpoint data, chain of custody, internal investigations, etc.

Persistence for the Endpoint

Persistence technology from Absolute provides you with visibility and control over all of your devices, regardless of user or location. If an Absolute software client is removed from an endpoint, it will automatically reinstall so you can secure each device and the sensitive data it contains. No other technology can do this.

Watch the Persistence video to learn more.


    There are no products in this category.
Back to Top